Technology (ICT) Systems; (4) Advanced Metering
Infrastructure (AMI); (5) SCADA (Supervisory
Control and Data Acquisition)/SAS (Substations
Automation Systems)/ Control Centre; (6) Utility
data centre; (7) Market.
5 CONCLUSIONS
In conclusion, the proposed security model shown in
Figure 3 consists of seven security requirements, nine
threats, seven access points, and thirty-eight security
controls.
The model addresses the limitation found in the
NIST model as NIST is a very high-level conceptual
model lacking details that make the proposed model
more practical and useful for the related sectors to
use.
This research will be beneficial to system
designers, information security practitioners, and
stakeholders to consider the key requirements and
challenges, identify the security threats and
vulnerabilities, and maintain the required
mechanisms through the initial stages of the
development of a SG system design.
For the future work, the next phase of this research is
to have the model validated by experts in the industry
including threats, access points, requirements, and
controls. The initial reviews confirmed this model
and the importance of it to support the energy sector
towards securing automated Smart Grids. Then, the
model will be verified by formal modelling.
REFERENCES
Al-Ali, A.R. and Aburukba, R. (2015) ‘Advanced role of
internet of things in the smart grid technology’, Journal
of Computer and Communications, pp. 229–233.
Al-Turjman, F. and Abujubbeh, M. (2019) ‘IoT-enabled
smart grid via SM: An overview’, Future Generation
Computer Systems, 96, pp. 579–590.
Aloul, F.A. (2012) ‘The Need for Effective Information
Security Awareness’, Journal of Advances in
Information Technology, 3(3), pp. 176–183.
Bedi, G., Venayagamoorthy, G.K., Singh, R., Brooks, R.R.
and Wang, K.C. (2018) ‘Review of Internet of Things
(IoT) in Electric Power and Energy Systems’, IEEE
Internet of Things Journal, 5(2), pp. 847–870.
Bekara, C. (2014) ‘Security issues and challenges for the
IoT-based smart grid’, Procedia Computer Science, 34,
pp. 532–537.
Benmalek, M., Challal, Y. and Derhab, A. (2019)
‘Authentication for Smart Grid AMI Systems: Threat
Models, Solutions, and Challenges’, Proceedings - 2019
IEEE 28th International Conference on Enabling
Technologies: Infrastructure for Collaborative
Enterprises, WETICE 2019, pp. 208–213.
CISA (2009) ‘Understanding Digital Signatures | CISA’.
Cisco (2017) What Is a Cyberattack? - Most Common
Types - Cisco. Available at: https://www.cisco.com/
c/en/us/products/security/common-cyberattacks.html
(Accessed: 21 February 2020).
Dagle, J.E. (2012) ‘Cyber-physical system security of smart
grids’, 2012 IEEE PES Innovative Smart Grid
Technologies, ISGT 2012, pp. 1–2.
Dalipi, F. and Yayilgan, S.Y. (2016) ‘Security and privacy
considerations for IoT application on smart grids:
Survey and research challenges’, Proceedings - 2016
4th International Conference on Future Internet of
Things and Cloud Workshops, W-FiCloud 2016, pp.
63–68.
Das, A.K. and Zeadally, S. (2019) Data Security in the
Smart Grid Environment, Pathways to a Smarter Power
System. Elsevier Ltd. doi:10.1016/B978-0-08-102592-
5.00013-2.
EPRI Electric Power Research Institute (2005) EPRI Smart
Grid Resource Center. Available at:
https://smartgrid.epri.com/.
Ganguly, P., Nasipuri, M. and Dutta, S. (2019) ‘Challenges
of the Existing Security Measures Deployed in the
Smart Grid Framework’, Proceedings of 2019 the 7th
International Conference on Smart Energy Grid
Engineering, SEGE 2019, pp. 1–5.
Ghasempour, A. (2019) ‘Internet of things in smart grid:
Architecture, applications, services, key technologies,
and challenges’, Inventions, 4(1)..
Glenn, C., Sterbentz, D. and Wright, A. (2017) Cyber
Threat and Vulnerability Analysis of the U.S. Electric
Sector, Inl (Idaho National Laboratory).
Gunduz, M.Z. and Das, R. (2020) ‘Cyber-security on smart
grid: Threats and potential solutions’, Computer
Networks, 169, p. 107094.
He, D., Kumar, N., Chen, J., Lee, C.C., Chilamkurti, N. and
Yeo, S.S. (2013) ‘Robust anonymous authentication
protocol for health-care applications using wireless
medical sensor networks’, Multimedia Systems, 21(1),
pp. 49–60.
IEEE (2018) About - IEEE Smart Grid. Available at:
https://smartgrid.ieee.org/about-ieee-smart-grid
(Accessed: 4 December 2019).
Al Khuffash, K. (2018) Smart grids—Overview and
background information, Application of Smart Grid
Technologies. Elsevier Inc. doi:10.1016/b978-0-12-
803128-5.00001-5.
Kimani, K., Oduol, V. and Langat, K. (2019) ‘Cyber
security challenges for IoT-based smart grid networks’,
International Journal of Critical Infrastructure
Protection, 25, pp. 36–49..
Mahmood, K., Ashraf Chaudhry, S., Naqvi, H., Shon, T.
and Farooq Ahmad, H. (2016) ‘A lightweight message
authentication scheme for Smart Grid communications
in power sector’, Computers and Electrical
Engineering, 52, pp. 114–124.